, Air Interface for Fixed and Mobile Broadband Wireless Access Systems, Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands and Amendment and Corrigendum, IEEE std 802.16e, vol.16, pp.16-2004, 2006.

P. Rengaraju, C. Lung, Y. Qu, and A. Srinivasan, Analysis on Mobile WiMAX Security, IEEETIC-STH, Information Assurance in Security and Privacy, 2009.

S. Xu and . Chin-tser, Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions

A. Altaf, M. Y. Javed, and A. Ahmed, Security Enhancements for Privacy and Key Management Protocol in IEEE 802, Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp.16-2005, 2008.

T. Han, N. Zhang, K. Liu, B. Tang, and Y. Liu, Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions

, IEEE International Conference on Mobile Ad Hoc and Sensor Networks, 2008.

M. Sakibur-rahman and M. S. Kowsar, WiMAX Security Analysis and Enhancement, 12th International Conference on Computer and Information Technology

M. Barbeau, Wimax /802.16 Threat analysis". ACM in workshop on quality of service and security in wireless and mobil networks, 2005.

M. Nasreldin, H. Aslam, and M. El-hennawy, Wimax Security". 22h international conference on advanced information networking and application, 2008.

J. Han, M. Yusoff-alias, and G. Min, Potential Denial of Service Attacks in IEEE802.16e-2005 Networks, 2009.

. Fang-yie, Y. Leu, C. Huang, and . Chiu, Improving security levels of IEEE802.16e authentication by Involving Diffie-Hellman PKDS»,2010 International Conference on Complex, Intelligent and Software Intensive Systems

R. Singh and S. Singh, Detection of Rogue Base Station Using MATLAB, International Journal of Soft Computing and Engineering, issue.1, pp.2231-2307, 2011.

S. Hussain, M. N. Khan, and M. Ibrahim, A Security Architecture for Wimax Networks, International Journal of Computer Applications, vol.50, issue.9, 2012.

A. Shahid-khan, *. Halikul-lenando, J. Abdullah, and N. Fisal, Secure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networks, Jurnal Teknologi (Sciences & Engineering), vol.73, pp.75-81, 2015.

S. Tang, P. Muller, and H. R. Sharif, WiMAX SECURITY AND QUALITY OF SERVICE AN END-TOEND PERSPECTIVE, 2010.

R. Prasad-l-fernando and J. Velez, WiMAX Networks, Techno-Economic Vision and Challenges, 2010.

D. B. Sebastian-m¨odersheim-luca and . Vigano, Ofmc: A symbolic modelchecker for security protocols, International Journal of Information Security, vol.4, issue.3, pp.181-208, 2004.

C. Cremers, The Scyther Tool: Verification, falsification, and analysis ofsecurity protocols, Proc. CAV, vol.5123, pp.414-418, 2008.

B. Blanchet, An efficient cryptographic protocol verifier based on Prologrules, Proc. 14th IEEE Computer Security Foundations Workshop(CSFW), pp.82-96, 2001.

N. Kahya, N. Ghoualmi, and P. , Lafourcade « Secure key management protocol in wimax, vol.4, p.6, 2012.

N. Kahya, N. Ghoualmi, and P. , Lafourcade « Key management protocol in wimax revisited » Advances in computer science, engineering and application, pp.1867-5662, 2012.

A. M. Taha1 and T. Amr, Abdel-Hamid, and Sofiène Tahar Formal Verification of IEEE 802.16 Security Sublayer Using Scyther Tool 2009 ESR Groups France